Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique
نویسندگان
چکیده
Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary the key cannot be reconstructed unless a predefined set of shares are been accumulated. The earlier schemes available in literature lead to high computational complexity during both sharing and reconstructing. Here we are suggesting a scheme which employs simple graphical masking method, done by simple ANDing for share generation and reconstruction can be done by simple ORing the qualified set of shares. We are proposing to append secret sharing technique along with conventional cryptography technique for key management to make key management more robust mainly against the chance of compromise and single point failure. Nevertheless it confirms authenticity, confidentiality, nonrepudiation and integrity as well. General Terms: Secret key distribution, Security.
منابع مشابه
A NEW SECURED VoIP USING VERIFIABLE SECRET SHARING
Voice communication carried out using the Internet Protocol (IP) for the transaction is known as Voice over Internet Protocol (VoIP). Voice over Internet Protocol is a technology for communicating using Internet protocol instead of traditional analog systems. Some VoIP services need only a regular phone connection, while others allows making telephone calls using an Internet connection instea...
متن کاملProactive Bai’s Secret Sharing Scheme for AOMDV Routing Protocol for Secured Communication in MANET
-The amount of applications in Wireless networks is developing continuously. And hence the need for security in wireless communication is also developing constantly with the development of Wireless communication particularly in MANET. Security is of a great concern in the present wireless communication. It is essential to provide security to the network from the attackers and their security att...
متن کاملBai’s Secret Sharing Scheme for Highly Secured AOMDV Routing Protocol
-Security in wireless network is of a great concern in the present wireless environment. Security is becoming a much essential part in wireless communication as intruders are very much keen in attacking the transmitted route or any node to steal the da ta packets It is indispensable to provide security to the network from the intruders and their security attacks. In order to provide a secured e...
متن کاملSecured Image Transmission Using a Novel Neural Network Approach and Secret Image Sharing Technique
In this paper we have combined both cryptography and steganography techniques. This provides the higher level of secure system in which the secret information can be transferred over any unsecured communication channel and to overcome the threat of intrusion. The presented work aims at secure image transmission where a random encryption algorithm is used to encrypt different shares of stego ima...
متن کاملHierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks
In wireless sensor networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing nodes are coordinated ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011